Tag Archives: Post for MiddNotes

@MiddInfoSec: Information Security RoadShow: 2/23/2016

Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.

Topics include:

  • How to spot a phish
  • Safe download practices and installing applications on your computer
  • Data classification and sensitive data
  • Removable media and when to use it
  • Password management and what to do with all of those passwords

 

Follow ITS-Information Security on Twitter: @MiddInfoSec

@MiddInfoSec: Guard Your Privacy When Offline or Traveling

Information Security has a New Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec

Planning a spring break vacation? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.

  • Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities and also protects against malware.
  • Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easy target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
  • Traveling soon? If you’re traveling with a laptop or mobile device, remove or encrypt confidential information. Consider using a laptop or device designated for travel with no personal information, especially when traveling out of the country.
  • Limit personal information stored on devices. Use a tool like Identity Finder to locate your personally identifiable information (e.g., SSN, credit card numbers, or bank accounts) on your computer, then secure or remove that information.

Physically protect yourself and your devices. Use a laptop lock, avoid carrying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at the ATM.

Protect Your Privacy

Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec

You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!

  • Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
  • Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
  • Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
  • Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
  • Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.

Protect Your Privacy

Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec

You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!

  • Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
  • Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
  • Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
  • Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
  • Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.

Friday Links — December 18, 2016

Virtual Reality

Image: Shawn Whiting, Erin Carson/TechRepublic

Virtual reality in 2016: The 10 biggest trends to watch – one point of view on what to expect, and what not to expect, in virtual reality in the coming year.

The 10 most important lessons IT learned in 2015 – Before moving on to the new year it is a good idea to reflect back on lessons learned during the previous 12 months. It is also a good idea to compare our experience to that of others.

Digital Media Bootcamp Update

We have added another workshop to the Digital Media Bootcamp series in January.
Wilson Media Lab

Wilson Media Lab

Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201

Date: January 14, 2016

Are you drowning in journal articles and books, but not sure how to keep track of it all? Are you working on a senior project or need help managing your resources? Let us help you on the next stage of your journey as a power researcher. After this workshop, you’ll be an expert in Zotero, the citation management tool that can help you save, organize, and cite your sources, and you’ll be able to create bibliographies with the click of a button. This workshop will be taught by Middlebury research librarian Stacy Reardon. PLEASE NOTE THE ALTERNATE ROOM.

Current list of Workshops

Title Date
Intro to Visual Literacy and Presentations @ 2:45pm 4-Jan-16 View & sign-up »
Intro to Audio Literacy @ 2:45pm 5-Jan-16 View & sign-up »
Quicktime, SnapZ Pro, MPEG Streamclip @ 2:45pm 6-Jan-16 View & sign-up »
Presentation Kick-starter @ 1pm 7-Jan-16 View & sign-up »
Equipment Demo: Scanners, Plotters and more @ 1pm 8-Jan-16 View & sign-up »
Copyright, IP and Creative Commons @ 1pm 11-Jan-16 View & sign-up »
Audio Software @ 2:45pm 11-Jan-16 View & sign-up »
Adobe InDesign @ 1pm 12-Jan-16 View & sign-up »
Adobe Illustrator @ 2:45pm 12-Jan-16 View & sign-up »
Equipment Demo: Cameras @ 1pm 13-Jan-16 View & sign-up »
Adobe Photoshop @ 2:45pm 13-Jan-16 View & sign-up »
Equipment Demo: Space and Place (Oculus Rift, Leap Motion, etc.) @ 1pm 14-Jan-16 View & sign-up »
Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201 14-Jan-16 View & sign-up »
Liberal Arts Data Bootcamp – Working with Data @1pm until 4pm 19-Jan-16 View & sign-up »
Liberal Arts Data Bootcamp – Visualizing Data @1pm until 4pm 20-Jan-16 View & sign-up »
Liberal Arts Data Bootcamp – Mapping Data @1pm until 4pm 21-Jan-16 View & sign-up »
Liberal Arts Data Bootcamp – Analyzing Textual Data @1pm until 4pm 22-Jan-16 View & sign-up »
Introduction to Information Literacy @ 2:45pm 25-Jan-16 View & sign-up »
Safe Computing Practices at Middlebury @ 1pm 25-Jan-16 View & sign-up »
Online Identity: Your Story to the World @ 2:45pm 26-Jan-16 View & sign-up »
Online Recording Lab: SANSSpace @ 1pm 27-Jan-16 View & sign-up »